You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/241849825

An introduction to computer viruses: Problems and solutions

Article  in  Library Hi Tech News · September 2012


DOI: 10.1108/07419051211280036

CITATIONS READS

3 36,765

1 author:

Imran Khan
Zakir Husain Delhi College (University of Delhi), New Delhi
28 PUBLICATIONS   28 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Imran Khan on 27 August 2014.

The user has requested enhancement of the downloaded file.


Library Hi Tech News
Emerald Article: An introduction to computer viruses: problems and
solutions
Imran Khan

Article information:
To cite this document: Imran Khan, "An introduction to computer viruses: problems and solutions", Library Hi Tech News, Vol. 29
Iss: 7 pp. 8 - 12
Permanent link to this document:
http://dx.doi.org/10.1108/07419051211280036
Downloaded on: 01-10-2012
References: This document contains references to 5 other documents
To copy this document: permissions@emeraldinsight.com

Access to this document was granted through an Emerald subscription provided by Emerald Author Access

For Authors:
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service.
Information about how to choose which publication to write for and submission guidelines are available for all. Please visit
www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
With over forty years' experience, Emerald Group Publishing is a leading independent publisher of global research with impact in
business, society, public policy and education. In total, Emerald publishes over 275 journals and more than 130 book series, as
well as an extensive range of online products and services. Emerald is both COUNTER 3 and TRANSFER compliant. The organization is
a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive
preservation.
*Related content and download information correct at time of download.
An introduction to computer viruses: problems
and solutions
Imran Khan

Introduction virus” is also commonly but erroneously There are many subtle and obvious
used to refer to other types of malware, distinctions that set the different types of
The development of large-scale adware, and spyware programs that do computer viruses apart from one
complex campus networks needs to be not have this reproductive ability. another. Some of the more typical
concerned with network security so Malware includes worms, Trojans, viruses are described below.
that the campus network remains stable. most rootkits, spyware, dishonest “Resident viruses” exist in a
In today’s information age, the pool of adware, crimeware, and other computer’s volatile memory (RAM).
information available continues to expand unwanted software, including true From there it can overcome and
logarithmically. Digital information has viruses. Viruses are sometimes interrupt all of the operations executed
transformed the way we create, transmit, confused with computer worms and by the system like corrupting files and
store, process and manipulate Trojan horses, which are technically programs that are opened, closed,
information. All the electronic resources different. A worm can exploit security copied, renamed, etc. Examples of this
and information are being stored in vulnerabilities to spread itself to other type of virus include Randex, CMJ,
computer systems for their retrieval and computers through networks, while a Meve, and MrKlunky.
dissemination. In today’s highly computer Trojan is a program that appears Multipartite viruses are distributed
dependant environment, computer harmless but hides malicious functions. through infected media and usually hide
security is a major concern. The security Worms and Trojans, like viruses, may in the memory. Gradually, the virus
of computers is routinely threatened by harm a computer system’s data or moves to the boot sector of the hard
malicious programs such as computer performance. A true virus can only drive and infects executable files on the
viruses, Trojan horses, worms and the like. spread from one computer to another hard drive and later across the computer
Once computers are infected these (in some form of executable code) when system.
programs may have the ability to its host is taken to the target computer; “Direct action viruses” replicate and
damage expensive computer hardware, for instance because a user sent it over take action when executed. When a
destroy valuable data, tie up limited a network or the internet, or carried it specific condition is met, the virus
computing resources or compromise the on a removable medium such as a comes into action and infects files in
security of sensitive information. People floppy disk, CD, DVD, or USB drive. the directory or folder that it is in and in
accumulate data from many sources using Transmission of viruses can increase by directories that are specified in the
various available electronic storage infecting files on a network file system AUTOEXEC.BAT file PATH. This
devices such as USB drives, CD/DVD- or a file system that is accessed by batch file is always located in the root
ROMs, etc. and then store the data on their another computer. Computer viruses directory of the hard disk and carries out
computers. Many people are not fully were labeled as viruses because of the certain operations when the computer is
computer literate and may be unaware of fact that they are similar to biological booted.
the latest virus threats. When users move viruses in the aspect of multiplying “Overwrite viruses” are characterized
or copy data from computer to computer themselves. Similarly they find a host by the fact that they delete the information
viruses can be transmitted via computer and then infect and multiply themselves. contained in the files that it infects,
systems, an internal network or the However, in both cases there must be a rendering them partially or totally
internet. Once a computer system gets cause in order for the problem to begin. useless once they have been infected.
infected with a virus, the data stored in it Some viruses and other malware have The only way to clean a file infected by
becomes insecure and the system symptoms noticeable to the computer an overwrite virus is to delete the file
becomes a source of infection to other user, but many are surreptitious and go completely, thus losing the original
systems during the transfer of data. unnoticed. content. Examples of this virus include
There are different types of computer Way, Trj.Reboot, Trivial.88.D.
Computer viruses and related viruses and each type has their own “Boot sector viruses” affect the boot
malware unique features that differentiate sector of a floppy, USB or hard disk
themselves from one another. Among drive. This is a crucial part of a disk, in
A computer virus is a computer the different types of viruses the most which information on the disk itself is
program that can replicate itself and familiar ones are computer-based stored together with a program that
infect a computer. The term “computer viruses and internet-based viruses. makes it possible to boot (start) the

8 Library Hi Tech News Number 7 2012, pp. 8-12, q Emerald Group Publishing Limited, 0741-9058, DOI 10.1108/07419051211280036
computer from the disk. Examples of depending on the actions that they names begin with letters in a certain
boot sector viruses include Polyboot.B, carry out. The virus may completely range of the alphabet.
AntiEXE. overwrite the file that it infects, or may “Spacefiller (cavity) viruses”, install
“Macro viruses” infect files that are only replace parts of the file, or may not themselves within the empty spaces of
created using certain applications or replace anything but instead rewrite the the code of the code of some programs
programs that contain macros. The file so that the virus is executed rather while not damaging the actual program
different ways to create macros would than the program the user intended. itself. An advantage of this is that the
be the macro recorder or Visual Basic The “encrypted virus” is probably the virus then does not increase the length
for Applications. Macro Virus uses the most difficult kind of bug to detect and of the program and can avoid the need
macro language for its program. the most difficult to stop. One may for some stealth techniques. The Lehigh
Microsoft Office has macros built into accidentally have downloaded one of virus is an early example of a spacefiller
its application and this virus affects so these bugs and before knowing it; the virus.
most of its application programs. Word entire computer can be infected. Many “FAT viruses” use the file allocation
Documents, Excel Spreadsheets, Power top virus protection programs miss table or FAT part of a disk used to
Point Presentations, and Access encrypted viruses because these bugs connect information and is vital to
Databases are most at risk. The use a different form of encryption every normal functioning of the computer.
document template is affected and time. In most cases virus protection This type of virus attack can be
hence every file that is opened is software can then identify and prevent especially dangerous, by preventing
affected. Some macro viruses contain a damage. access to certain sections of the hard
trigger that is usually a date on which “Companion viruses” have the name drive where important files are stored.
the virus is programmed to start the because once they get into the system Damage caused can result in
actual damage. Some other macro they “accompany” the other files that information losses from individual files
viruses share the characteristics of a already exist. In other words, in order to or even entire directories.
computer worm by spreading across carry out their infection routines, “Worms” are technically not viruses,
networks by using the macro facility companion viruses can wait in memory but they have the ability to self-
available in Microsoft Outlook. until a program is run (resident viruses) replicate, and can lead to negative
Examples of macro viruses are Relax, effects on the computer system but
or act immediately by making copies of
Melissa.A, Bablas, O97M/Y2K. usually they are detected and eliminated
themselves (direct action viruses).
“Directory viruses” change the paths by antiviruses. Clicking on an infected
Some examples of this type include
that indicate the location of a file. By e-mail usually transmits worms.
Stator, Asimov.1539, and Terrax.1069.
executing a program (file with the Examples of worms include
“Network viruses” rapidly spread
extension. EXE or .COM) that has PSWBugbear.B, Lovgate.F, Trile.C,
through a local area network (LAN),
been infected by a virus, one may Sobig.D, Mapson.
and sometimes over the internet. “Trojans or Trojan horses” are
unknowingly be running the virus
program, while the virus has previously Generally, network viruses multiply malicious codes (not viruses) as they
moved the original file and program. through shared resources, i.e. shared do not reproduce by infecting other files,
Once infected, it becomes impossible to drives and folders. When the virus nor do they self-replicate like worms.
locate the original files. infects a computer, it searches through A Trojan horse program has the
“Polymorphic viruses” encrypt or the network to attack new potential appearance of having a useful and
encode themselves in a different way prey. When the virus finishes infecting desired function. While it may
(using different algorithms and a computer, it moves on to the next and advertise its activity after launching,
encryption keys) every time they the cycle repeats itself. The most this information is not apparent to the
infect a system. This makes it dangerous network viruses are Nimda user beforehand. Secretly, the program
impossible for less sophisticated and SQLSlammer. performs other undesired functions.
antivirus software to find them using “Nonresident viruses” are similar to Trojan horses may cause data
string or signature searches (because resident viruses as they use the destruction or compromise a system by
they are different in each encryption) replication of a computer module. providing a means for another computer
and also enables them to create a large These viruses selects one or more files to gain access, thus bypassing normal
number of copies of themselves. to infect each time the module is access controls. Trojan horse attacks are
Examples of this type include Elkern, executed. one of the most serious threats to
Marburg, Satan Bug, and Tuareg. “Stealth viruses” try to trick computer security as they can be
“File infectors” are viruses that antivirus software by intercepting its spread in the guise of literally
infect programs or executable files requests to the operating system. It has anything, which makes it almost
(files with an .EXE, .DRV, .DLL, the ability to avoid detection from some essentially impossible to notice them,
.BIN or .COM extension). When one antivirus software programs. even when one is looking specifically
of these programs is run, directly or “Sparse infectors” minimize the for them.
indirectly, the virus is activated, probability of being discovered by “Logic bombs” are also not viruses
producing the damaging effects it is various means such as only infecting but rather camouflaged segments of
programmed to carry out. The majority every 20th time a file is executed; only other programs. Their objective is to
of existing viruses belongs to this infecting files whose lengths are within destroy data on the computer once
category, and can be classified narrowly defined ranges or whose certain conditions have been met. Logic

Library Hi Tech News Number 7 2012 9


bombs go undetected until launched, and up so that the virus runs automatically Symptoms of virus infection on
the results can be devastating. Some every time one turns on the computer. computer
examples are a logic bomb that deletes “Misdirection viruses” contain a built
one’s photos on Halloween, or a one that in sub-program that is made to give false The following are some primary
deletes a database table if a certain readings to the virus protection software. indicators that a computer may be
employee is fired. One may think that the computer has a infected with a virus:
“E-mail viruses” move around via bug in one directory, when, in fact, the
e-mail messages and replicate by virus is busy harming the computer in a .
The computer runs slower than usual.
automatically mailing themselves to as whole other area. .
The computer stops responding, or
many people as possible through the use The “cloning virus”, when it locks up frequently.
of e-mail messaging. downloaded, quickly creates duplicates .
The computer crashes, and then it
“Spyware” is designed to intercept for.exe files on the computer system, restarts every few minutes.
or take partial control of a computer’s hoping that one may click on one when .
The computer restarts on its own.
operation. Basically, it is a program that really meaning to click on a healthy Additionally, the computer does
is able to watch what users are doing program already present on the not run as usual.
with their computer and then send that computer system. .
Applications on the computer do
information over the internet. Spyware The “author virus” finds an.exe file not work correctly.
consists of lots of computer programs and actually deletes and rewrites code .
Disks or disk drives become
that are able to attach themselves to the so that the program is changed. Few inaccessible.
operating system in nefarious ways, and common computer viruses run this way .
Items do not print correctly.
that can destroy the power of the since the level of virus needs to be so .
Unusual error messages start
computer’s processing system. sophisticated. displaying.
A “rootkit virus” is an undetectable The “Bad Penny virus” was the first .
Menus and dialog boxes are seen in
virus that attempts to allow someone computer virus to ever hit the internet. distorted form.
else to gain control of a computer This is a bug that automatically passes .
There is a double extension on an
system. The term rootkit comes from itself on to everyone on a LAN or on the attachment that is recently opened,
the Linux administrator root user. internet unless something stops it. such as a .jpg, .vbs, .gif, or .exe.
Firewalls were invented specifically .
An antivirus program is disabled for
These viruses are usually installed by
because of this virus. no reason. Additionally, the antivirus
Trojans and are normally disguised as
The “rewriting virus” rewrites some program cannot be restarted.
operating system files.
of the most needed files on a computer .
An antivirus program cannot be
“Secret viruses” make changes to the
system, as well as fills up the hard drive installed on the computer, or the
files on a computer, or completely
with all sorts of invisible files one could antivirus program will not run.
replace files, but then try to trick the
not normally see. . New icons appear on the desktops
computer and the antivirus program into The “Melissa virus” affects both PC
thinking that the originals are being that have not been put there, or the
and Mac users by automatically icons are not associated with any
used. Most advanced virus protection emailing itself to other people without
programs can stop these common recently installed programs.
permission. It can be extra harmful .
Strange sounds or music plays from
viruses dead in their tracks. while using a private mail server at a
“Time delay viruses” take a much the speakers unexpectedly.
workplace. .
A program disappears from the
slower, more disciplined path towards The “browser hijacker” can spread
ruining the computer. Instead of computer even though it has not
itself in numerous ways and effectively been intentionally removed.
instantly trying to take over the hijacks certain browser functions,
computer the moment one downloads
.
Out-of-memory error messages are
usually in the form of redirecting the received even though the computer
them, they wait and slowly infect files user automatically to particular sites.
bit by bit. One may not have been has sufficient RAM.
It is usually assumed that this tactic is .
A partition of the hard drive
online for days but then suddenly finds designed to increase revenue from web
the computer has become infected. disappears.
advertisements. There are a lot of .
Windows Task Manager is unable
These viruses can be kept under such viruses, and they usually have
control by running virus protection to started.
“search” included somewhere in their
software every few days. description. CoolWebSearch may be the
“Antivirus viruses” attack the pre- most well known example, but others Symptoms of worms and Trojan
installed antivirus program in hopes of are nearly as common. horse viruses in e-mail messages
disabling it so that other viruses can be “Web scripting viruses” become part
downloaded. This is a major reason many of executable complex computer code When a computer virus infects
people have a virus protection program in order to provide interesting content. e-mail messages or infects other files
as well as a separate anti-spyware or anti- Although malicious sites are sometimes on a computer, the following symptoms
malware program on their computers. created with purposely-infected code, may be noticed:
“Multi-headed viruses” attach many such cases of virus exist because
themselves to .exe files on a computer, of code inserted into a site without the .
The infected file may make
but it also affects the computer’s start webmaster’s knowledge. copies of itself. This behavior may

10 Library Hi Tech News Number 7 2012


use up all the free space on the hard help in protecting and staying one step sites, or, at the very least, should be
disk. ahead of the hackers. scanned before opening them.
.
A copy of the infected file may be “Keep regular backup of data” is Installing regular updates. There is
sent to all the addresses in an e-mail highly recommended to avoid losing it. a reason why Windows has a
address list. Avoid using unknown USB drives. feature called critical updates. There is
.
The computer virus may reformat When data is copied from a computer an entire branch of Microsoft dedicated
the hard disk. This behavior deletes that is infected with a virus and to staying one step ahead of the
files and programs. transferred to the other computer, it hackers so when they manage to fix a
.
The computer virus may install may cause virus infection in that possible security loophole, one needs
hidden programs, such as pirated computer too. Therefore, it is always to download the patch right away. Help
software that may then be advisable that the USB drives should be Microsoft help you prevent computer
distributed and sold from the scanned for viruses before copying their viruses from causing too much trouble.
computer. data to a computer system. Know what to look for. Even casual
.
The computer virus may reduce Install a reliable antivirus program. computer users should have an idea of
security that can enable intruders to Even if the computer is not hooked up to how the computer operates, what
remotely access the computer or the internet, a reliable antivirus program normal pop up windows look like and
the network. is low cost and makes common sense. what popular viruses are out there.
.
An e-mail message with a strange Some antivirus programs are free and Stay away from cracked software. It is
attachment is received. When the work almost as well as industry giants so secret that one can download illegal,
attachment is opened, dialog boxes such as Norton and McAfee. cracked versions of some programs
appear, or a sudden degradation in Install anti-spyware and anti- online. As tempting as it may be, these
system performance occurs. malware programs. Many of the top files are almost always infested with
.
People complain that they have anti-spyware programs are completely advanced and difficult to detect malware.
recently received e-mail messages free. Spybot Search and Destroy and Therefore, one should play it safe and get
from a person that contained CCleaner are just two free programs that software from a trusted source.
attached files, which the person can help prevent computer viruses. As Install a firewall. A firewall is a
did not send. The files that are helpful as these programs are, one must program that screens incoming internet
attached to the e-mail messages update them and run them on a regular and network traffic. Along with the
may have extensions such as .exe, basis to do any good. virus program, it can help prevent
.bat, .scr, and .vbs. Avoid suspicious web sites. A good unauthorized access to the computer.
virus protection program alerts while Be prepared to lock down. If one hears
visiting a web site that attempts to install of a virus that is spreading like wildfire
Symptoms of spyware or run a program on the computer. through the internet, make an extra effort
Never open e-mail attachments to be careful. Do not open any suspicious
When spyware affects a computer, without scanning them first. The most e-mail or accept any downloads for a
the following may result: common way by which viruses are week or two until the virus protection
spread throughout the internet is still program has been updated.
.
Slow internet connection. via e-mail. Some attachments, like
. Changing web browser’s home pictures, now display in e-mails and
FURTHER READING
page. do not require an attachment to be
.
Loss of internet connectivity. manually opened, but other documents Al-Daoud, E., Jebril, I.H. and Zaqaibeh, B.
.
Failure to open some programs, (2008), “Computer virus strategies and
do. One should make sure that they
detection methods”, International Journal
including security software. are using an e-mail client that scans all of Open Problems in Computer Science and
.
Unable to visit specific web sites, e-mail attachments beforehand. Mathematics (IJOPCM), Vol. 1 No. 2,
which may include redirecting to Set up automatic scans. Many of pp. 29-36.
other sites. the top antivirus programs, as well as
Mustafa, F. and Khan, I. (2008), “Automation
the best anti-spyware programs, have of Jamia Hamdard (Hamdard University):
settings that let them automatically run a case study of HMS Central Library”, ILA
Preventive measures for data safety during down times or in the middle of Bulletin, Vol. 44 Nos 3/4, pp. 24-7.
and avoid virus infections the night. Of course, the computer must
Stibor, T. (2010), “A Study of detecting
be on for this to happen, but having
computer viruses in real-infected files in the
Prevention is the best remedy for daily scans run when nothing else is n-gram representation with machine learning
avoiding virus infections and threats. going on is a great way to prevent even methods”, Proceedings of the 23rd
A virus can compromise personal the latest computer viruses from International Conference on Industrial
information and even destroy a sticking around too long. Engineering and other Applications of
computer completely. It becomes a Watch the downloads. Downloading Applied Intelligent Systems (IEA/AIE’10),
major hazard and security risk for music, movies and other items are so Vol. 1, Springer, Berlin, pp. 509-19.
huge databases stored and used massive that it may be easy to sneak a Wang, J. and Liu, X. (2011), “Computer
libraries on their servers. There are virus along for the ride. These files network security of university and
many low cost measures, which may should be downloaded from trusted preventive strategy”, Proceedings of IEEE

Library Hi Tech News Number 7 2012 11


3rd International Conference on http://support.microsoft.com/kb/129972 www.pcguide.com/care/data/virus/
Communication Software and Networks bgTypes-c.html
(ICCSN), Xi’an, May, pp. 143-5.
www.makeuseof.com/tag/types-computer-
Zhen, Y. (2010), “Security of library www.buzzle.com/articles/different-types-
information system under the network
viruses-watch/
of-computer-viruses.html
environment”, Proceedings of 3rd
International Conference on Advanced http://antivirus-software.topchoicereviews.
Computer Theory and Engineering (ICACTE com/11-ways-prevent-computer-viruses_ www.topbits.com/types-of-computer-
2010), Chengdu, China, Vol. 4, pp. 127-9. viruses.html
258.html
Web sites www.isoftwarereviews.com/types-of-
www.secureurpc.com/secureurpc-articles/
types-of-computer-viruses.php computer-viruses/
http://flyunity.net/antivirus/computer-
viruses-and-preventive-measures/
www.cknow.com/cms/vtutor/types-of-
www.secureurpc.com/secureurpc-articles/
www.pcsecurityalert.com/pcsecurityalert- viruses.html
types-of-viruses.php
articles/what-is-a-computer-virus.htm
http://files-recovery.blogspot.com/2010/ Imran Khan (ikhanjh@gmail.com;
www.pcsecurityalert.com/pcsecurityalert- ikhan@jamiahamdard.ac.in), SPA and
articles/different-types-of-computer- 06/20-common-types-of-computer-
viruses-and.html In-charge, Membership, Networking &
viruse.htm
IT Applications Division, HMS Central
www.pcsecurityalert.com/pcsecurityalert- www.microsoft.com/security/antivirus/ Library, Jamia Hamdard (Hamdard
articles/computer-virus-prevention.htm whatis.aspx University), New Delhi, India.

12 Library Hi Tech News Number 7 2012

View publication stats

You might also like